On 6/11/2019 11:12 AM, Alessandro Vesely wrote:
On Mon 10/Jun/2019 22:17:01 +0200 Dave Crocker wrote:
On 6/10/2019 1:17 AM, Alessandro Vesely wrote:
On Sat 08/Jun/2019 18:49:03 +0200 Dave Crocker wrote:

Except that most users don't actually see that address because these days most
MUAs only display the display address.


We often came across this realization.  Since DMARC hinges on that field, I
think the spec should include some advice to MUA implementation.

Unfortunately there is no 'advice' to give that has any utility.

If you feel otherwise, please try to formulate it, including the basis for
believing it useful, and then try to get community support for it.


I'd propose bullets like the following for Section 12.4:

     o  In the MUA, it is safe to only show the display name if its
        correspondence to the email address can be verified by looking it up in
        the address book or similar storage.  In case a display name compares
        equal to one that corresponds to a different email address, such
        discrepancy should be enhanced unless the two email addresses are
        established to be equivalent to each other.  Email addresses are
        equivalent when they correspond to the same person, or to the same role
        within a given organization, or, in practice, when the user says that
        they are.

     o  The authentication status of the message should be visible.

These are good for a online MUA system where the backend has both verification and display controls.

With an offline MUA, where we have store and forward, there is the "who was the verifying domain" trust issue. If the backend is not going to clean it up, make it safe for the user's MUA to pick the mail, then it has wider chance of user security concerns and issues due to lack of persistency and consistency in offline MUA behavior. With a hybrid, the MUA is more in sync with the backend operations, so rather than the MUA doing the calculations based on the data it has, the backend supplies the indicators, public or proprietary, for the compliant hybrid MUA to display.

As a developer of MUAs, offline, online and a hybrid, with Native Gui, Text-based (ANSI/VT100) and HTML-based Messaging UIs, there has been many single sourcing and integration considerations. Overall, we only have open standard RFC5322 protocol to communicate between the MSA/MTA/MDA and MUA. I think the "battle" or "dilemma" has been the trust of the A-R header verifying.domain" header created by the MDA mail receiving/inbound components performing the DKIM verification. Can the MUA trust the verifying.domain? A possible MUA design tip could be to add something equal to:

  [_] Trust the Authentication-Result Verifying Domain IFF it matches the
      the Authentication Login (Mail Pickup) Domain Server.

or something along those lines. With the MUA I used personally (TBIRD), I created a rule to highlight, color tag the Pass (Green) Fail (Red) DKIM results read from my backend verifying domain A-R header. Others A-R beader are ignored.

Each MUA can implement this idea their own way. But it is important to consider the different MUA designs. With Online, like a Web-Mail interface, this offers 100% backend UI design controls, single sourced and safer for the end-user. It is easier to explore the integration requirements. With offline/hybrid MUA system needs are more complex and the ideas will need to be translated into a RFC5322 meta-headers. Of course, the offline MUA can do the DKIM verification itself. It has always been in interesting idea to see what comes about. While I recall some earlyr 3rd party Add-on attempts, I personally have not see too much in this area with MUA vendors themselves. We won't see persistency and consistency here. Hybrids is what I expect more to happen where the backend can add more "meta-data" designed for the proprietary hybrid MUA to understand, and its not just for DKIM security but a broad range of MUA A/A concepts.

A trust on first use (TOFU) approach would seem to be possible.

In practical terms, what does that mean?  Who does what, exactly?

A discrepancy can be enhanced by bold characters, by a pop-up, or by a beep and
an alert message.  Anything but silently displaying a familiar name which
actually stands for something else.

A user can then arrange her address book so as to make it clear to the MUA that
a class of email addresses are equivalent to one another, in order to avoid
meaningless alerts.

Good ideas for MUA implementations, not sure how we can standardize this though. Lots of psychology involved. In fact, with the Red/Blue color tagging I've have in Tbird, I haven't been paying too much attention to the RED tags I see due to DKIM verification failures. If I see both a red and blue, that tells me most likely an original DKIM signature was broken (RED) but it was resigned with 2nd list server signature (GREEN).

For Private 1 to 1 communications, I would not expect to see RED here because there should be no middle ware interference, but there are non-list related indirect scenarios that can cause this. I wouldn't expect it though.



Does this subject deserve a ticket?

Since it has nothing to do with errors or problems with the current spec, I
don't see how to justify a ticket.


Section 12.4 seems to have some problems.  The first bullet should be reworked,
because it can be understood as suggesting that in cases like, for example:

     From: "[email protected] via Bug Tracker" <[email protected]>

a _MUA_ should "execute the DMARC mechanism on the domain name found there
rather than the domain name discovered originally."  That sounds nonsense,
first, because MUAs should rather base on A-R records added by the MX.

This is what I meant above. You are proposing a trust concept for the MUA on which A-R record to "believe."

The MUA needs trust on the meta-data headers it sees. In theory, it could trust (with higher confidence) the headers added by the user's mail hosting provider or the server the user logged into, or basically the last processing machine at the hosting provider.

Maybe Murray can comment on this, I don't recall seeing a discussion where the A-R verifying.domain was tied to some trusted hosted domain we have confidence in. Can the MX or MDA domains be associated with the A-R verifying the domain?

Right now, the only A-R header that can be trusted is the last one created by the receiving domain for in-house use, or a Web-mail interface or for a hybrid. For a offline reader, the user will need to make that the RFC5322 scripting designs or the advanced MUA can offer an option to make that trust association.

--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to